fix(encrypt-fw): put build_msg under LOG_LEVEL flagIn tools directory, contrary to other parts of TF-A code,LOG_LEVEL_NOTICE is 20, and LOG_LEVEL_ERROR is 10. If LOG_LEVEL isset to 10, which is t
fix(encrypt-fw): put build_msg under LOG_LEVEL flagIn tools directory, contrary to other parts of TF-A code,LOG_LEVEL_NOTICE is 20, and LOG_LEVEL_ERROR is 10. If LOG_LEVEL isset to 10, which is the case if BUILD_INFO=0, then we can have thiscompilation warning:src/main.c:29:19: warning: ‘build_msg’ defined but not used [-Wunused-const-variable=] 29 | static const char build_msg[] = "Built : " __TIME__ ", " __DATE__; | ^~~~~~~~~Avoid that by putting it under '#if LOG_LEVEL >= LOG_LEVEL_NOTICE'.Signed-off-by: Yann Gautier <yann.gautier@st.com>Change-Id: Ic724610d6df811fc889775dbd361087e0958d31e
show more ...
build(encrypt-fw): don't generate `build_msg.c`This change avoids generating a build message source file on the shell,instead using the `__DATE__` and `__TIME__` macros directly.Change-Id: Ida53
build(encrypt-fw): don't generate `build_msg.c`This change avoids generating a build message source file on the shell,instead using the `__DATE__` and `__TIME__` macros directly.Change-Id: Ida537d4c3e550f2fbbd977472ed6573491d17c23Signed-off-by: Chris Kay <chris.kay@arm.com>
tools: Add firmware authenticated encryption toolAdd firmware authenticated encryption tool which utilizes OpenSSLlibrary to encrypt firmwares using a key provided via cmdline. Currentlythis tool
tools: Add firmware authenticated encryption toolAdd firmware authenticated encryption tool which utilizes OpenSSLlibrary to encrypt firmwares using a key provided via cmdline. Currentlythis tool supports AES-GCM as an authenticated encryption algorithm.Signed-off-by: Sumit Garg <sumit.garg@linaro.org>Change-Id: I60e296af1b98f1912a19d5f91066be7ea85836e4